This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

IBM announces launch of vulnerability scanner and manager

Share this article:

A new solution which identify key vulnerabilities in real-time across a network has been launched this week by IBM.

Named the QRadar Vulnerability Manager, IBM said that it helps identify, sort, contextualise and prioritise network vulnerabilities into a single view. According to the company, it can automatically scan the network and perform the analysis, with results aggregated alongside the latest X-Force threat intelligence alerts and incident reports from the National Vulnerability Database.

Also added in this release is an embedded, PCI-certified scanner which can be scheduled to run periodically or triggered based on network events.

Murray Benadie, managing director of Zenith Systems, an IBM business partner, said: “QRadar Vulnerability Manager is a breakthrough for the IT security industry. It can cut a huge list of vulnerabilities in half, if not more. Users will quickly see vulnerabilities on their networks, without trying to mash products together - that is how information falls through the cracks. This is a true game changer.”

Also this week, IBM launched a new version of the IBM Security zSecure Suite, a mainframe security solution with IBM QRadar Security Intelligence Platform integration. This combined solution helps provide organisations with enterprise-wide visibility of mainframe security events, supported with automated real-time threat alerts and customised compliance reporting.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Sandworm vulnerability seen targeting SCADA-based systems

Sandworm vulnerability seen targeting SCADA-based systems

Hard on the heels of the `Sandworm' spy group revealed by iSIGHT Partners earlier in the week, Trend Micro says its has spotted the zero-day vulnerability of the same name ...

Russian-speaking criminals account for £420m of card fraud annually

Russian-speaking criminals account for £420m of card fraud ...

New research claims to quantify the scale of card fraud in Russian speaking circles. And according to Group-IB's analysis over the last year, that fraud clocks in at a hefty ...

Light-based printer attack overcomes air-gapped computer security

Light-based printer attack overcomes air-gapped computer security

Multi-function printers - a route to bypass air-gapped computer security.